Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 3151 - 3180 of 6721

Full-Text Articles in Physical Sciences and Mathematics

Optimizing Campus Mobility With A Focus On Sustainability: A Graph Theory Approach To Intra-Campus Transportation Networks, Quinn Nelson, Donald Steffensmeier, Sachin Pawaskar Jan 2016

Optimizing Campus Mobility With A Focus On Sustainability: A Graph Theory Approach To Intra-Campus Transportation Networks, Quinn Nelson, Donald Steffensmeier, Sachin Pawaskar

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

The idea of public transportation is supported by most in theory but often heavily criticized by users when put into application. There are common tensions that are related to public transportation, as described by frequent users: unreliable, too crowded, and slow. The University of Nebraska-Omaha (UNO) is a growing metropolitan institution that uses a shuttle system to transport students among their three campuses daily. As of 2015, the current total student enrollment is approximately 16,000; UNO plans to enroll 20,000 students by 2020. The expected student growth is also reflected by the current construction of new buildings and expansion of …


Organizational And Systems Factors Leading To Systems Integration Success After Merger And Acquisition, Monika Glazar-Stavnicky Jan 2016

Organizational And Systems Factors Leading To Systems Integration Success After Merger And Acquisition, Monika Glazar-Stavnicky

ETD Archive

Mergers and acquisitions (M&A) are a common technique used by companies to grow and enter new markets. The success rate of these transactions continues to be less than desired. Information Systems (IS) have been proven to be a key component influencing the success of mergers. While numerous factors have been found to lead to systems integration success, the studies have not analyzed the fit that is required when two organizations and systems are joined. This research focuses on the match between organizational variables of competencies and processes of two merging companies, as well as the match between systems variables of …


An Analysis Of The Relationship Between Security Information Technology Enhancements And Computer Security Breaches And Incidents, Linda Betz Jan 2016

An Analysis Of The Relationship Between Security Information Technology Enhancements And Computer Security Breaches And Incidents, Linda Betz

CCE Theses and Dissertations

Financial services institutions maintain large amounts of data that include both intellectual property and personally identifiable information for employees and customers. Due to the potential damage to individuals, government regulators hold institutions accountable for ensuring that personal data are protected and require reporting of data security breaches. No company wants a data breach, but finding a security incident or breach early in the attack cycle may decrease the damage or data loss a company experiences. In multiple high profile data breaches reported in major news stories over the past few years, there is a pattern of the adversary being inside …


An Empirical Investigation Of Factors Affecting Resistance To Using Multi-Method Authentication Systems In Public-Access Environments, Joseph Marnell Jan 2016

An Empirical Investigation Of Factors Affecting Resistance To Using Multi-Method Authentication Systems In Public-Access Environments, Joseph Marnell

CCE Theses and Dissertations

Over the course of history, different means of object and person identification as well as verification have evolved for user authentication. In recent years, a new concern has emerged regarding the accuracy of verifiable authentication and protection of personal identifying information (PII), because previous misuses have resulted in significant financial loss. Such losses have escalated more noticeably because of human identity-theft incidents due to breaches of PII within multiple public-access environments. Although the use of various biometric and radio frequency identification (RFID) technologies is expanding, resistance to using these technologies for user authentication remains an issue. This study addressed the …


Meeting Meaningful-Use Requirements With Electronic Medical Records In A Community Health Clinic, Tony Andrew Richardson Jan 2016

Meeting Meaningful-Use Requirements With Electronic Medical Records In A Community Health Clinic, Tony Andrew Richardson

Walden Dissertations and Doctoral Studies

Small nonprofit medical practices lack the technical expertise to implement electronic medical records (EMRs) that are consistent with federal meaningful-use requirements. Failure to comply with meaningful-use EMR requirements affects nonprofit community health care leaders' ability to receive reimbursement for care. Complexity theory was the conceptual framework used in this exploratory single case study. The purpose of the study was to explore the strategies nonprofit community health care leaders in Washington, DC used to implement EMRs in order to comply with the meaningful-use requirements. Data were collected via in-depth interviews with 7 purposively-selected health care leaders in a nonprofit clinic and …


Unexpected Events In Nigerian Construction Projects: A Case Of Four Construction Companies, Gabriel Baritulem Pidomson Jan 2016

Unexpected Events In Nigerian Construction Projects: A Case Of Four Construction Companies, Gabriel Baritulem Pidomson

Walden Dissertations and Doctoral Studies

In Nigeria, 50% to 70% of construction projects are delayed due to unexpected events that are linked to lapses in performance, near misses, and surprises. While researchers have theorized on the impact of mindfulness and information systems management (ISM) on unexpected events, information is lacking on how project teams can combine ISM and mindfulness in response to unexpected events in construction projects. The purpose of this case study was to examine how project teams can combine mindfulness with ISM in response to unexpected events during the execution phase of Nigerian construction projects. The framework of High Reliability Theory revealed that …


The Impact Of Transportation Infrastructure On Nigeria's Economic Developmeny, William A. Agbigbe Jan 2016

The Impact Of Transportation Infrastructure On Nigeria's Economic Developmeny, William A. Agbigbe

Walden Dissertations and Doctoral Studies

The United Nations Development Programme (UNDP) described Nigeria's road networks as one of the poorest and deadliest transportation infrastructural systems in the world. Data from the UNDP and the World Bank (WB) show that Nigeria has suffered transportation infrastructure deficits; these data also illustrate Nigeria as one of the lowest indices in economic development in the last decade. This qualitative case study addressed the impact of a lack of investment in transportation infrastructure in the form of road networks on Nigeria's economic development. The purpose of the study was to understand the relationship between the investment in road networks and …


Exploring Factors Influencing Information Technology Portfolio Selection Process In Government-Funded Bioinformatics Projects, Braulio J. Cabral Jan 2016

Exploring Factors Influencing Information Technology Portfolio Selection Process In Government-Funded Bioinformatics Projects, Braulio J. Cabral

Walden Dissertations and Doctoral Studies

In 2012, the National Cancer Institute's (NCI) Board of Scientific Advisors (BSA) conducted a review of the Center for Biomedical Informatics and Information Technology's (CBIIT) bioinformatics program. The BSA suggested that the lack of a formal project selection process made it difficult to determine the alignment of projects with the mission of the organization. The problem addressed by this study was that CBIIT did not have an in-depth understanding of the project selection process and the factors influencing the process. The purpose of this study was to understand the project selection process at CBIIT. The research methodology was an exploratory …


Providing Hands-On Training With Bioinformatics Databases: A Collaboration Between Vcu Libraries & Wright Center For Clinical And Translational Research, Karen H. Gau, Julie A. Arendt, Amy Olex, Aaron R. Wolen Jan 2016

Providing Hands-On Training With Bioinformatics Databases: A Collaboration Between Vcu Libraries & Wright Center For Clinical And Translational Research, Karen H. Gau, Julie A. Arendt, Amy Olex, Aaron R. Wolen

VCU Libraries Faculty and Staff Presentations

Background
With the goal of increasing specialized services for researchers, Virginia Commonwealth University (VCU) Libraries sent its basic science librarians to an intensive training on bioinformatics databases, “A Librarian’s Guide to NCBI.” VCU’s Wright Center for Clinical and Translational Research (Wright CCTR) was expanding the educational component of its bioinformatics support around the same time. This year, the librarians partnered with the Wright CCTR to offer an introductory bioinformatics database workshop introducing researchers to genetic/genomic databases.

Methods
For one week in June, sessions were conducted introducing up to 30 faculty and staff to The Cancer Genome Atlas and NCBI’s Gene, …


Using A Data Warehouse As Part Of A General Business Process Data Analysis System, Amit Maor Jan 2016

Using A Data Warehouse As Part Of A General Business Process Data Analysis System, Amit Maor

CMC Senior Theses

Data analytics queries often involve aggregating over massive amounts of data, in order to detect trends in the data, make predictions about future data, and make business decisions as a result. As such, it is important that a database management system (DBMS) handling data analytics queries perform well when those queries involve massive amounts of data. A data warehouse is a DBMS which is designed specifically to handle data analytics queries.

This thesis describes the data warehouse Amazon Redshift, and how it was used to design a data analysis system for Laserfiche. Laserfiche is a software company that provides each …


On Detecting Maximal Quasi Antagonistic Communities In Signed Graphs, Ming Gao, Ee-Peng Lim, David Lo, Philips Kokoh Prasetyo Jan 2016

On Detecting Maximal Quasi Antagonistic Communities In Signed Graphs, Ming Gao, Ee-Peng Lim, David Lo, Philips Kokoh Prasetyo

Research Collection School Of Computing and Information Systems

Many networks can be modeled as signed graphs. These include social networks, and relationships/interactions networks. Detecting sub-structures in such networks helps us understand user behavior, predict links, and recommend products. In this paper, we detect dense sub-structures from a signed graph, called quasi antagonistic communities (QACs). An antagonistic community consists of two groups of users expressing positive relationships within each group but negative relationships across groups. Instead of requiring complete set of negative links across its groups, a QAC allows a small number of inter-group negative links to be missing. We propose an algorithm, Mascot, to find all maximal quasi …


Data Persistence In Eiffel, Jimmy J. Johnson Jan 2016

Data Persistence In Eiffel, Jimmy J. Johnson

Theses and Dissertations--Computer Science

This dissertation describes an extension to the Eiffel programming language that provides automatic object persistence (the ability of programs to store objects and later recreate those objects in a subsequent execution of a program). The mechanism is orthogonal to other aspects of the Eiffel language. The mechanism serves four main purposes: 1) it gives Eiffel programmers a needed service, filling a gap between serialization, which provides limited persistence functions and database-mapping, which is cumbersome to use; 2) it greatly reduces the coding burden incurred by the programmer when objects must persist, allowing the programmer to focus instead on the business …


A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth Jan 2016

A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth

Kno.e.sis Publications

The Specific Aims of this application are to use a paradigmatic approach that combines Semantic Web technology, Natural Language Processing and Machine Learning techniques to:

1) Describe drug users’ knowledge, attitudes, and behaviors related to the non-medical use of Suboxone and Subutex as discussed on Web-based forums.
2) Identify and describe temporal patterns of non-medical use of Suboxone and Subutex as discussed on Web-based forums.

The research was carried out by an interdisciplinary team of members of the Center for Interventions, Treatment and Addictions Research (CITAR) and the Ohio Center of Excellence in Knowledge- enabled Computing (Kno.e.sis) at Wright State …


Co-Evolution Of Rdf Datasets, Sidra Faisal, Kemele M. Endris, Saeedeh Shekarpour, Sören Auer, Maria-Esther Vidal Jan 2016

Co-Evolution Of Rdf Datasets, Sidra Faisal, Kemele M. Endris, Saeedeh Shekarpour, Sören Auer, Maria-Esther Vidal

Kno.e.sis Publications

Linking Data initiatives have fostered the publication of large number of RDF datasets in the Linked Open Data (LOD) cloud, as well as the development of query processing infrastructures to access these data in a federated fashion. However, different experimental studies have shown that availability of LOD datasets cannot be always ensured, being RDF data replication required for envisioning reliable federated query frameworks. Albeit enhancing data availability, RDF data replication requires synchronization and conflict resolution when replicas and source datasets are allowed to change data over time, i.e., co-evolution management needs to be provided to ensure consistency. In this paper, …


Adoption Of Information And Communication Technology In Nigerian Small- To Medium-Size Enterprises, Kessington Enaye Okundaye Jan 2016

Adoption Of Information And Communication Technology In Nigerian Small- To Medium-Size Enterprises, Kessington Enaye Okundaye

Walden Dissertations and Doctoral Studies

Small- to medium-size enterprises (SMEs) play a vital role in a dynamic economy through job creation, poverty alleviation, and socioeconomic development in developed and developing countries. The purpose of this multiple case study was to explore how SME leaders in Lagos, Nigeria, adopted information and communication technology (ICT) as a business strategy to increase profitability and compete globally. Organizational leaders have adopted ICT so that their organizations can become more efficient, effective, innovative, and globally competitive. This study involved 4 SMEs that had successfully implemented ICT. The participants included 5 SME leaders from each of the SMEs. The data collection …


Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano Jan 2016

Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano

Kno.e.sis Publications

The Internet of Things (IoT) is experiencing fast adoption because of its positive impact to change all aspects of our lives, from agriculture in rural areas, to health and wellness, to smart home and smart-x applications in cities. The development of IoT applications and deployment of smart IoT-based solutions is just starting; smart IoT applications will modify our physical world and our interaction with cyber spaces, from how we remotely control appliances at home to how we care for patients or elderly persons. The massive deployment of IoT devices represents a tremendous economic impact and at the same time offers …


Cloud Practical Exam Invigilation Control Systems With The Objective Of Enhancing Quality Control For Online Exams, Gordon O'Reilly Jan 2016

Cloud Practical Exam Invigilation Control Systems With The Objective Of Enhancing Quality Control For Online Exams, Gordon O'Reilly

Theses

Online cloud computing courses are becoming more common place facilitating a student to study from home from anywhere in the world. Coupled with this trend is a need for educational institutions to facilitate students to take tests or exams online from home. It reduces the remote student’s time and cost of travel to an exam invigilation centre as well as reducing the educational institution’s test administration overhead. It does however introduce potential quality control concerns. A new industry called online proctoring has emerged that attempts to provide quality control in these online test scenarios.

This research provides an insight into …


Evaluating Information Technology (It) Integration Risk Prior To Mergers And Acquisitions (M&A), Deepak Khazanchi, Vipin Arora Jan 2016

Evaluating Information Technology (It) Integration Risk Prior To Mergers And Acquisitions (M&A), Deepak Khazanchi, Vipin Arora

Information Systems and Quantitative Analysis Faculty Publications

Corporate mergers and acquisitions (M&A) are considered significant, from both a strategic and an economic point of view, across almost all sectors of the economy.1 M&A is a complex process involving risk that ranges from financial and legal matters to sales and marketing challenges and everything in between. Despite well-established benefits of strategically driven expansion and integration of businesses through M&A, the consolidated organization exposes itself to a number of anticipated, unknown and unintended risk factors. The risk concerns the overall organizational integration of some or all of the previously distinct and interdependent assets, structures, business processes, technologies, systems, …


The Relation Between Patient Education And Picc Line Occlusion, Patricia Louise Petroulias Jan 2016

The Relation Between Patient Education And Picc Line Occlusion, Patricia Louise Petroulias

Wayne State University Dissertations

The purpose of this study was to test the feasibility of using an electronic tablet to supplement patient and caregiver education about PICC line maintenance and to compare the percentage of PICC line complications in the intervention group with national percentage rates for patients and caregivers. Newly diagnosed cancer patients who had PICC lines inserted participated in this study. They used an electronic tablet to learn the 10 steps for flushing their PICC lines correctly. They also met with the researcher via FaceTime to review the steps.

A total of 11 patients participated in this quasi-experimental pilot study. They completed …


Strategies To Obtain Maximum Usage Of Enterprise Resource Planning Systems, Edward James Schaffer Jan 2016

Strategies To Obtain Maximum Usage Of Enterprise Resource Planning Systems, Edward James Schaffer

Walden Dissertations and Doctoral Studies

Business organizations invest significant resources implementing enterprise resource planning (ERP) systems, yet some organizations utilize less than 75% of the ERP system capabilities. The purpose of this single-site case study was to explore ERP utilization strategies implemented by 4 managers in the information technology (IT) department from 1 organization that uses an ERP system in the Midwest region of the United States. The conceptual framework that grounded this study was the user participation theory. Data were collected through participant interviews and analyzed using traditional text analysis. Member checking was used to strengthen the credibility and trustworthiness of the interpretation of …


Web Scraping The Easy Way, Yolande Neil Jan 2016

Web Scraping The Easy Way, Yolande Neil

Honors College Theses

Web scraping refers to a software program that mimics human web surfing behavior by pointing to a website and collecting large amounts of data that would otherwise be difficult for a human to extract. A typical program will extract both unstructured and semi-structured data, as well as images, and convert the data into a structured format. Web scraping is commonly used to facilitate online price comparisons, aggregate contact information, extract online product catalog data, extract economic/demographic/statistical data, and create web mashups, among other uses. Additionally, in the era of big data, semantic analysis, and business intelligence, web scraping is the …


Harnessing The Power Of Text Mining For The Detection Of Abusive Content In Social Media, Hao Chen, Susan Mckeever, Sarah Jane Delany Jan 2016

Harnessing The Power Of Text Mining For The Detection Of Abusive Content In Social Media, Hao Chen, Susan Mckeever, Sarah Jane Delany

Conference papers

Abstract The issues of cyberbullying and online harassment have gained considerable coverage in the last number of years. Social media providers need to be able to detect abusive content both accurately and efficiently in order to protect their users. Our aim is to investigate the application of core text mining techniques for the automatic detection of abusive content across a range of social media sources include blogs, forums, media-sharing, Q&A and chat - using datasets from Twitter, YouTube, MySpace, Kongregate, Formspring and Slashdot. Using supervised machine learning, we compare alternative text representations and dimension reduction approaches, including feature selection and …


An Exploration Of Baby Boomer Mass Retirement Effects On Information Systems Organizations, Nithyanandam Mathiyazhagan Mathiyazhagan Jan 2016

An Exploration Of Baby Boomer Mass Retirement Effects On Information Systems Organizations, Nithyanandam Mathiyazhagan Mathiyazhagan

Walden Dissertations and Doctoral Studies

The potential knowledge loss from Baby Boomer generation employee retirements can negatively affect information systems organizations. The purpose of this hermeneutic phenomenology study was to explore the lived experiences of the leaders and managers of information systems organizations as they tried to maintain operational continuity after Baby Boomer worker retirements. The impact of this issue was the operational continuity after the Baby Boomer worker retirement. The social impact of this issue was the knowledge loss events that might result in business loss or even bankruptcy. McElroy's knowledge life cycle model was the conceptual framework for this study that included knowledge …


Strategies To Control Internal Factors Affecting Information Systems Projects In Puerto Rico, Annie Luz Roman Acevedo Jan 2016

Strategies To Control Internal Factors Affecting Information Systems Projects In Puerto Rico, Annie Luz Roman Acevedo

Walden Dissertations and Doctoral Studies

Many project managers and business leaders lack effective strategies to control internal factors that affect information systems (IS) projects, which may impede leadership's ability to respond to market changes. The purpose of this multiple case study was to explore strategies used by 6 purposefully selected project managers who successfully implemented information system development (ISD) projects by controlling the internal factors that affected different ISD project phases in Puerto Rico's telecommunication service industry. The framework that guided this study was coordination theory. The data collection process included semistructured interviews and project documentation including business requirements, project charters, project plans, and lessons …


Retention Of Information Technology Employees, Sherry Ann Dixon Jan 2016

Retention Of Information Technology Employees, Sherry Ann Dixon

Walden Dissertations and Doctoral Studies

Business leaders often realize greater profitability when they have strategies to retain IT

employees. However, the cost to replace IT employees creates significant challenges for

business leaders. Given the growing impact of technology on operational costs, retention

of IT employees is imperative. This exploratory single case study sought to identify the

strategies that leaders use to increase IT employee retention. The population was 6

leaders from a military organization in Norfolk, Virginia, responsible for the retention of

IT employees. Herzberg's two-factor theory was the conceptual framework for this study.

The data was collected from semi-structured interviews with 6 leaders along …


Business Strategies For Asean's Single Window In Southeast Asia, Craig Allen Mcgee Jones Jan 2016

Business Strategies For Asean's Single Window In Southeast Asia, Craig Allen Mcgee Jones

Walden Dissertations and Doctoral Studies

Since the Asian Financial Crisis of 1997 and the Global Financial Crisis of 2007, members of the Association of Southeast Asia Nations (ASEAN) have sought to strengthen ASEAN's regional economies through a digital trade project known as the ASEAN Single Window (ASW). The purpose of this case study was to explore the business strategies that multinational organizational leaders used to overcome business barriers while implementing ASEAN partnership contracts and ASW region-wide projects. This study may be unique in that, at the time of this research, there was no published study in which researchers had explored a single window for a …


Mitigation Strategies Of Technostress On Supply Chain Management, Robert Lewis Penn Jan 2016

Mitigation Strategies Of Technostress On Supply Chain Management, Robert Lewis Penn

Walden Dissertations and Doctoral Studies

Logistics managers work to create practices that reduce technostress, which is associated with diminished productivity in supply chain management. The purpose of this multiple case study was to explore the mitigation strategies that logistics managers at distribution centers used to reduce technostress with their employees in the Los Angeles County, California area. The conceptual framework included in this study was the sociotechnical systems theory. Semistructured interviews were conducted with 6 logistics managers from large distribution centers who implemented mitigation strategies that demonstrably reduced technostress with their employees. Public documents and physical artifacts reviewed in this study included productivity assessment tools, …


Exploring The Cybersecurity Hiring Gap, Adam O. Pierce Jan 2016

Exploring The Cybersecurity Hiring Gap, Adam O. Pierce

Walden Dissertations and Doctoral Studies

Cybersecurity is one of the fastest growing segments of information technology. The Commonwealth of Virginia has 30,000 cyber-related jobs open because of the lack of skilled candidates. The study is necessary because some business managers lack strategies for hiring cybersecurity professionals for U.S. Department of Defense (DoD) contracts. The purpose of this case study was to explore strategies business managers in DoD contracting companies used to fill cybersecurity positions. The conceptual framework used for this study was the organizational learning theory. A purposeful sample of 8 successful business managers with cybersecurity responsibilities working for U.S. DoD contracting companies that successfully …


Role Of Outsourcing In Stress And Job Satisfaction Of Information Technology Professionals, Janell Renee Robinson Jan 2016

Role Of Outsourcing In Stress And Job Satisfaction Of Information Technology Professionals, Janell Renee Robinson

Walden Dissertations and Doctoral Studies

Information technology (IT) outsourcing poses a potential job loss threat to IT professionals, which can decrease job security, job satisfaction, and organizational commitment. The problem that this study addressed was the perceived role of IT outsourcing in the job stress, job dissatisfaction, and turnover intention of IT professionals. The purpose of this study was to explore how job-related stress, job dissatisfaction, and turnover intention within the IT profession are influenced by outsourcing as perceived by IT workers themselves. Phenomenology was the methodology used, and the person-environment fit theory formed the theoretical framework for this study. The research questions addressed outsourcing …


Information Abundance And Knowledge Commons, Michael J. Madison Jan 2016

Information Abundance And Knowledge Commons, Michael J. Madison

Book Chapters

Standard accounts of IP law describe systems of legal exclusion intended to prompt the production and distribution of intellectual resources, or information and knowledge, by making those things artificially scarce. The argument presented here frames IP law instead as one of several possible institutional responses to the need to coordinate the use of intellectual resources given their natural abundance, and not necessarily useful or effective responses at that. The chapter aims to shift analytic and empirical frameworks from those grounded in law to those grounded in governance, and from IP law in isolation to IP law as part of resource …